hakin9 - Issue 01/2009 Summary:
BASICS 16 BPMTK DIDIER STEVENS The article will illustrate techniques to bypass security mechanisms and show Proof of Concept (PoC) techniques for Malware by using the Basic Process Manipulation Tool Kit (BPMTK). Thanks to this paper you will learn why your applications running in a limited user context are still vulnerable to attacks and malware. ATTACK 22 Keylogger 2.0 ANTONIO FANELLI A very useful paper showing how to develop a basic Web 2.0 keylogger and use it against an XSS vulnerable website and remote cross-domain scripting with IFRAME. 28 Defeating AntiVirus Software JIM KELLY In this article you will learn various methods of hiding hacker tools from antivirus products as well as the limitations of these techniques. 36 Hacking IM Encryption Flaws ADITYA K. SOOD This paper sheds a light on encryption problems in Instant Messaging client's primary memory which lead to hacking. 42 HTTP Tunnel MICHAEL SCHRATT This article will demonstrate how to hide tracks using HTTP Tunneling techniques. 48 Agent-based Traffic Generation RAPHAEL MUDGE In this article the author will introduce the mobile agent programming paradigm. He will also show you how to reproduce scenarios and generate a realistic and adaptable network traffic. DEFENSE 54 Javascript Obfuscation Part 2 DAVID MACIEJAK This article will uncover how ActiveX instantiation could be hidden by malicious guys using some javascript trics. But from the other hand will show how to use opensource tools to automate the unobfuscation of malicious javascript code. In the first part, we saw how to decode some basic malicious Javascript code, in this last part we will introduce some technics to quickly identify what a shellcode embedded in the Javascript code do and present you some advanced Javascript obfuscation tips used by attacker.
Tidak ada komentar:
Posting Komentar